Sciweavers

1373 search results - page 97 / 275
» Secure multi-mode systems and their applications for pervasi...
Sort
View
DRM
2006
Springer
14 years 13 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
CISIS
2009
IEEE
14 years 3 months ago
A Lightweight Implementation of Trusted Domain Enforcement for Secure Embedded Web Server
—Deployment of open source software for embedded system is increasing while ubiquitous devices have become widely used. System designer need to cope with malicious input which is...
Ruo Ando
VIS
2004
IEEE
115views Visualization» more  VIS 2004»
14 years 10 months ago
Visualization in Grid Computing Environments
Grid computing provides a challenge for visualization system designers. In this research, we evolve the dataflow concept to allow parts of the visualization process to be executed...
Ken Brodlie, David A. Duce, Julian R. Gallop, Musb...
COORDINATION
2005
Springer
14 years 2 months ago
Coordination Systems in Role-Based Adaptive Software
Software systems are becoming more open, distributed, pervasive, and connected. In such systems, the relationships between loosely-coupled application elements become non-determini...
Alan W. Colman, Jun Han
MIDDLEWARE
2005
Springer
14 years 2 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet